lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 25 Jul 2018 22:18:01 -0700 (PDT) From: David Miller <davem@...emloft.net> To: jakub.kicinski@...ronome.com Cc: oss-drivers@...ronome.com, netdev@...r.kernel.org Subject: Re: [PATCH net-next 0/4] nfp: protect from theoretical size overflows and SR-IOV errors From: Jakub Kicinski <jakub.kicinski@...ronome.com> Date: Wed, 25 Jul 2018 19:40:33 -0700 > This small set changes the handling of pci_sriov_set_totalvfs() errors. > nfp is the only driver which fails probe on pci_sriov_set_totalvfs() > errors. It turns out some BIOS configurations may break SR-IOV and > users who don't use that feature should not suffer. > > Remaining patches makes sure we use overflow-safe function for ring > allocation, even though ring sizes are limited. It won't hurt and > we can also enable fallback to vmalloc() if memory is tight while > at it. Series applied, thanks Jakub.
Powered by blists - more mailing lists